50 High Scores for Answers About P2P Terminator

Updated on amusement 2024-06-04
7 answers
  1. Anonymous users2024-02-11

    1.Turn on the 360 ARP firewall, others can't limit your Internet speed, and P2P terminator is useless.

    2.If you're using a P2P Terminator, remove the 360 hook from the settings to intercept external attacks.

    3.To increase the speed of the Internet, you can use a network accelerator, which generally costs money.

    4.Recommend a software CFOSSspeed that uses the traffic adjustment feature that allows you to get faster access speeds, for free.

  2. Anonymous users2024-02-10

    The relationship between your dormitories. I really didn't say anything.

    You install a 360, then turn on the ARP firewall, if there is a P2P restriction on you, the firewall will alarm! It shows the IP and MAC address of the machine that attacked you, and with these evidence, just find someone and you're done!

    Those anti-P2P software are basically not very easy to use!

    Don't just look at VS, VS servers have been really bad lately, often stuck! I often drop out of the line with the 2m one myself!

  3. Anonymous users2024-02-09

    I've used P2P, it's very easy to use, but, at the same time, it also increases the burden on the network, and it's a buddy in the same dormitory, so you can explain it clearly. Of course, for the sake of fairness, I have a suggestion that is worth trying. Type in the display bar or enter the router, there is an item in it that can help you define the IP and MAC address, and set the average traffic.

    This is the fairest, and everyone should not fight.

  4. Anonymous users2024-02-08

    Hehe, I've also used the Terminator, but I personally don't think it's easy to use.

    You can also make the next Terminator yourself.

    But only if you boot up earlier than his.

    Then it won't work.

    And yes. Some terminators are invalid, all of them are 0, and they don't have control.

    Of course, ARP can also be used.

  5. Anonymous users2024-02-07

    1.I have tried this Zheng potato stool for the firewall hand-change, if P2P is opened on both sides, just interception and mutual attack are enough to occupy the LAN bandwidth, and it is not recommended to use it.

    2.The current P2P is different from the previous one.,It seems that I used the version when I was using it.,It also depends on who has the highest authority who can restrict don't call travelers.,It is recommended that you find an old version of P2P from the Internet.,Probably about.,There's no problem with high or low permissions.。 Limit each other directly!

    3.If you use it together, it is recommended that you limit it gently, otherwise you will not be able to play with each other.

    4.Remember the other party's IP, server address, DNS address, manually obtain the IP when necessary, set it to the same IP as the other party, and if the other party does not have a firewall, malicious retaliation, no one can use it.

  6. Anonymous users2024-02-06

    Let's see if your P2P is the highest authority. Then it is recommended that you go to the next Rising Firewall to crack the anti-ARP attack. Open PPS to see by yourself,**,You can also account for the speed of the network。

    This is a more reliable method at present, don't use it if you don't like it, and if you're not in a good mood, please forgive me for imitating dismemberment.

  7. Anonymous users2024-02-05

    Then you buy a thing that steals the net (* hee-hee!!

Related questions
9 answers2024-06-04

Because P2P will continue to send packets in the network to query the network status. This way everyone will be slow. Plus now the software is developed. >>>More

6 answers2024-06-04

Currently, ARP spoofing, skulls, CAM attacks, IP spoofing, fake IPs, fake MACs, etc >>>More

28 answers2024-06-04

Definitely useful, I also have someone here who is using P2P control, I have no problem after turning on 360ARP. First of all, I will tell you how P2P controls other people's Internet speed, P2P is mainly an ARP attack that limits other people's Internet speed by hypocritically or tampering with ARP. If you install 360ARP, you can prevent others from using it to control your Internet speed, even if others turn on P2P, they can't control your Internet speed.

2 answers2024-06-04

The IP address is used to represent the initiator and receiver of the communication, but when the data is really sent to which destination, the MAC address must be found according to the IP address, and the data can be delivered according to the MAC address in order to really send the data. Therefore, to confirm which IP is owned by which MAC address, you have to maintain a table, which is the ARP table The principle of ARP spoofing is to continuously send the ARP spoofing packet "I am a gateway" to the host in the local area network, so that there will be a record of "gateway IP --- attacker MAC" in the ARP cache table of the deceived host. Because the attacker's host has sent packets to the spoofed host, the ARP cache table of the spoofed host will have the record "Attacker's IP - Attacker's MAC". >>>More

3 answers2024-06-04

First of all, after the installation is opened, it is correct: Options-Advanced Settings-Network Card Settings (pull to your network card below and your route, IP gateway, etc.) will appear. Then go to the advanced settings - select the time plan settings - new, enter the name casually, the following is the schedule, generally select all, right-click - select all - OK. >>>More